BIND DNS Vulnerability Security Update Advisory (CVE-2023-50868)
Overview
An update has been made available to address a vulnerability in BIND DNS from the Internet Systems Consortium (ISC). users of affected versions are advised to update to the latest version.
Affected Products
BIND
- Versions from 9.0.0 through 9.16.46
- Versions from 9.18.0 through 9.18.22
- Versions 9.19.0 through 9.19.20
BIND Supported Preview Edition
- Versions from 9.9.3-S1 through 9.16.46-S1
- Versions from 9.18.11-S1 through 9.18.22-S1
Resolved Vulnerabilities
CPU consumption vulnerability in the DNSSEC validation resolver when processing incoming responses from DNSSEC signed zones using NSEC3 in BIND and BIND Supported Preview Edition (CVE-2023-50868)
Vulnerability Patches
vulnerability Patches were made available in the February 13, 2024 update. Please follow the Referenced Sites to update to the latest Vulnerability Patches version.
BIND versions 9.16.48, 9.18.24, and 9.19.21
BIND Supported Preview Edition 9.16.48-S1, 9.18.24-S1
Referenced Sites
[1] CVE-2023-50868 Detail
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
[2] BIND 9 Security Release and Multi-Vendor Vulnerability Handling, CVE-2023-50387 and CVE-2023-50868
detail https://www.isc.org/blogs/2024-bind-security-release/
[3] CVE-2023-50868: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
https://kb.isc.org/docs/cve-2023-50868